1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luden [163]
3 years ago
7

Select the correct answer.

Computers and Technology
2 answers:
Mnenie [13.5K]3 years ago
8 0

Answer:

D

Explanation:

AveGali [126]3 years ago
3 0

Answer:A

Explanation:

You might be interested in
Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt?.
Salsk061 [2.6K]

That is calld a bruteforce attack

4 0
2 years ago
Sammy's Seashore Supplies rents beach equipment such as kayaks, canoes, beach chairs, and umbrellas to tourists. Write a program
murzikaleks [220]

Answer:

// here is code in java.

import java.util.*;

// class definition

class SammysRentalPrice

{

// main method of the class

public static void main(String[] args) {

    // scanner object to read input from user

    Scanner s=new Scanner(System.in);

      // ask user to enter year

       System.out.print("Enter the rented minutes:");

       // read minutes

      int min=s.nextInt();

      // find hpurs

      int hours=min/60;

      // rest  of minutes after the hours

      min=min%60;

      // total cost

      int tot_cost=(hours*40)+(min*1);

      // print hours,minute and total cost

      System.out.println("total hours is: "+hours);

      System.out.println("total minutes is: "+min);

      System.out.println("total cost is: "+tot_cost);

     

}

}

Explanation:

Read the rented minutes of an equipment from user with the help of scanner object. Calculate the hours and then minutes from the given minutes.Calculate the cost by multiply 40 with hours and minute with 1.Add both of them, this will be the total  cost.

Output:

Enter the rented minutes:140

total hours is: 2

total minutes is: 20

total cost is: 100

7 0
3 years ago
Ip ____ is the falsification of the source ip address in a packet's header so that it appears to have come from a trusted or leg
tensa zangetsu [6.8K]
<span>IP spoofing the falsification of the source ip address in a packet's header so that it appears to have come from a trusted or legitimate sender.</span>
5 0
3 years ago
Which type of processing best describes the correction of errors or the rearrangement of a job's running time?
Neko [114]

Answer:

Real-time

Explanation:

i am sure because on my test it said corect

6 0
4 years ago
<img src="https://tex.z-dn.net/?f=%28a%20%2B%20b%29%20%20%7B2%7D" id="TexFormula1" title="(a + b) {2}" alt="(a + b) {2}" align
MariettaO [177]

Answer:

ab2

Explanation:

3 0
3 years ago
Other questions:
  • Who found a way of making the steam engine more efficient?
    9·2 answers
  • What software development model focuses on improving the product in small steps each time through the cycle?
    14·2 answers
  • Parallel tangent and coincident are examples of what
    13·1 answer
  • write the structure of an email message ques.2 what do you mean by search engine? write its component .ques. 3 what are the adva
    9·1 answer
  • Which piston stroke of the four-stroke cycle prepares the fuel mixture for combustion??
    8·1 answer
  • if an open cut or wound is exposed to contamination washing it in hot water and hand soap is not sufficient to keep safe
    14·2 answers
  • This inventor made their own fortune. They had little to no help in become one of the first black millionaires. They invented a
    9·1 answer
  • Create a program in c/c++ which accepts user input of a decimal number in the range of 1 -100. Each binary bit of this number wi
    9·1 answer
  • Which of the following represents a transition?
    5·1 answer
  • Business Rules constraints falls into two categories:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!